[go: up one dir, main page]

CN106355112A - Method of destructing data in encrypted mobile storage device and server - Google Patents

Method of destructing data in encrypted mobile storage device and server Download PDF

Info

Publication number
CN106355112A
CN106355112A CN201610762135.0A CN201610762135A CN106355112A CN 106355112 A CN106355112 A CN 106355112A CN 201610762135 A CN201610762135 A CN 201610762135A CN 106355112 A CN106355112 A CN 106355112A
Authority
CN
China
Prior art keywords
mobile storage
storage apparatus
destroyed
data
enciphered mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610762135.0A
Other languages
Chinese (zh)
Inventor
秦玉杰
杨文�
沈琳琳
操秩
程建波
胡船歌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Taisau Intelligent Technology Co Ltd
Original Assignee
Shenzhen Taisau Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Taisau Intelligent Technology Co Ltd filed Critical Shenzhen Taisau Intelligent Technology Co Ltd
Priority to CN201610762135.0A priority Critical patent/CN106355112A/en
Publication of CN106355112A publication Critical patent/CN106355112A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention is applicable to the technical field of communications and provides a method of destructing data in an encrypted mobile storage device and a server, wherein the method comprises: receiving a data destruction request, wherein the data destruction request includes an identifier of an encrypted mobile storage device to be destructed, and the encrypted mobile storage device to be destructed corresponding to the identifier of the encrypted mobile storage device to be destructed; detecting whether the encrypted mobile storage device to be destructed is activated or not; if yes, transmitting the data destruction command to the encrypted mobile storage device to be destructed in order to destruct the data stored in the encrypted mobile storage device to be destructed. It can be seen that it is possible to decrease the chances for the data in the encrypted mobile storage device to leak by implementing the embodiment of the invention.

Description

Data destruction method and server in a kind of enciphered mobile storage apparatus
Technical field
The invention belongs to communication technical field, data destruction method and clothes in more particularly, to a kind of enciphered mobile storage apparatus Business device.
Background technology
Movable storage device such as usb flash disk (usb flash disk, u disk) can facilitate storage and the realization of data The mutual biography of data between different terminal equipment.In order to avoid the leakage of data in u disk in data during mutually passing, at present on the market The movable storage device of encryption, such as recognition of face authenticated encryption u disk occur.Use recognition of face authenticated encryption u disk in user, Realized to recognition of face certification by the face characteristic information collecting is identified comparison by built-in encryption system The deciphering of encryption u disk, so that read the encryption data of recognition of face authenticated encryption u disk storage.
But, find in practice, when encryption u disk is accidentally lost, the encryption system in encryption u disk may be by lawless person Break through, the probability that the encryption data of encryption u disk storage is revealed is higher.
Content of the invention
The embodiment of the present invention provides data destruction method and server in a kind of enciphered mobile storage apparatus, can reduce and add The leakage probability of data in close movable storage device.
Embodiment of the present invention first aspect discloses data destruction method in a kind of enciphered mobile storage apparatus, methods described Including:
Receive and destroy request of data, wherein said destruction request of data includes enciphered mobile storage apparatus mark to be destroyed, And the described enciphered mobile storage apparatus to be destroyed of inquiry identify corresponding enciphered mobile storage apparatus to be destroyed;
Detect whether described enciphered mobile storage apparatus to be destroyed have been turned on;
If described enciphered mobile storage apparatus to be destroyed is detected to have been turned on, moving storage to described encryption to be destroyed and setting Preparation is sent and is destroyed data command to destroy the data of storage in described enciphered mobile storage apparatus to be destroyed.
Embodiment of the present invention second aspect discloses a kind of device management server, and described device management server includes:
Receiving unit, destroys request of data for receiving, and wherein said destruction request of data includes encryption to be destroyed and moves Storage device identification;
Equipment query unit, for inquiring about the enciphered mobile storage apparatus mark described to be destroyed that described receiving unit receives Corresponding enciphered mobile storage apparatus to be destroyed;
Equipment starts detector unit, deposits for detecting that the encryption described to be destroyed that described equipment query unit inquires is moved Whether storage equipment has been turned on;
Destroy data command transmitting element, move if starting detector unit for described equipment and described encryption to be destroyed is detected Dynamic storage device has been turned on, then send to described enciphered mobile storage apparatus to be destroyed and destroy data command to treat pin described in destroying Ruin the data of storage in enciphered mobile storage apparatus.
In the embodiment of the present invention, device management server receive destroy request of data after, if detect this to be destroyed plus Close movable storage device has been turned on, then send destruction data command to this enciphered mobile storage apparatus to be destroyed and treat pin to destroy this Ruin the data of storage in enciphered mobile storage apparatus.It can be seen that, implement the embodiment of the present invention, when enciphered mobile storage apparatus are lost accidentally When losing and being used, device management server can send destruction request of data to this enciphered mobile storage apparatus and be added with destroying this The data of storage in close movable storage device, thus reduce the probability that in this enciphered mobile storage apparatus, data storage is revealed.
Brief description
Fig. 1 is that the flow process of data destruction method in a kind of enciphered mobile storage apparatus provided in an embodiment of the present invention is illustrated Figure;
Fig. 1 (a) is a kind of operation interface schematic diagram of individual's online management platform provided in an embodiment of the present invention;
Fig. 1 (b) is a kind of register interface schematic diagram of individual's online management platform provided in an embodiment of the present invention;
Fig. 2 is a kind of structural representation of device management server provided in an embodiment of the present invention;
Fig. 3 is a kind of above-mentioned application interface changing method of operation provided in an embodiment of the present invention based on von Neumann system Computer system.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with drawings and Examples, right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only in order to explain the present invention, and It is not used in the restriction present invention.
It should be noted that the term using in embodiments of the present invention is the mesh only merely for description specific embodiment , and it is not intended to be limiting the present invention." one of singulative used in the embodiment of the present invention and appended claims Kind ", " described " and " being somebody's turn to do " are also intended to including most forms, unless context clearly shows that other implications.It is also understood that this Used in literary composition, term "and/or" refers to and comprises one or more associated any or all possible group listing project Close.
The embodiment of the present invention can apply to the device management server of managing encrypted movable storage device, when adding of user After close movable storage device such as encrypts u disk loss, user can be on the device management server platform of management this encryption u disk Carry out destroying the operation of data storage in this encryption u disk, once this device management server detects this encryption u disk being used, This device management server can send destruction data command to this encryption u disk immediately and is stored in this encryption u disk with destroying Data.
The embodiment of the invention discloses data destruction method and server in a kind of enciphered mobile storage apparatus, can reduce The leakage probability of data in enciphered mobile storage apparatus.It is described in detail individually below.
Refer to Fig. 1, Fig. 1 is data destruction method in a kind of enciphered mobile storage apparatus disclosed in the embodiment of the present invention Schematic flow sheet.As shown in figure 1, data destruction method may comprise steps of in this enciphered mobile storage apparatus.
S101, device management server receive destroys request of data, and wherein this destruction request of data includes encryption to be destroyed Movable storage device identifies, and inquires about the mobile storage of the corresponding encryption to be destroyed of this enciphered mobile storage apparatus to be destroyed mark Equipment.
Server can refer to, with higher computational power, storage capacity, can be supplied to multiple users by network and use Computer, wherein this device management server can refer to the server for managing this enciphered mobile storage apparatus.Specifically, One such as personal online management of platform managing this enciphered mobile storage apparatus can be arranged by this device management server Platform etc., such as shown in Fig. 1 (a), this personal online management platform can taken with this equipment control similar to an operation interface Client such as personal computer (personal computer, pc) client or smart mobile phone client that business device network is connected Shown on end etc.;One or more enciphered mobile storage apparatus can be bound under this personal online management platform, such as, Under personal online management platform shown in Fig. 1 (a), binding has enciphered mobile storage apparatus 1, enciphered mobile storage apparatus 2, adds Close movable storage device 3 and enciphered mobile storage apparatus 4, when some in the plurality of enciphered mobile storage apparatus or multiple plus When close movable storage device is lost, user can choose loss on this personal online management platform or user wants to destroy it This enciphered mobile storage apparatus of storage inside data simultaneously click on the enciphered mobile storage apparatus that this chooses destruction data below Button (as shown in Fig. 1 (a)) to send this destruction request of data to this device management server, then this device management server Receive this destruction request of data of this client transmission.Wherein this destruction request of data can be used to ask to destroy the encryption lost The data of storage in movable storage device.Wherein, the mobile storage of this encryption that should be selected on personal online management platform sets Standby can be used as this enciphered mobile storage apparatus to be destroyed.Such as, in bound enciphered mobile storage apparatus in Fig. 1 (a), Selected enciphered mobile storage apparatus are enciphered mobile storage apparatus 1, then this enciphered mobile storage apparatus 1 can be treated as this Destroy enciphered mobile storage apparatus.
It should be noted that this enciphered mobile storage apparatus to be destroyed can be one or more, the embodiment of the present invention is not It is construed as limiting.
In addition, this destruction request of data that this pc or smart mobile phone client pass through this personal online management platform transmission can To include this enciphered mobile storage apparatus mark to be destroyed, this device management server can be deposited according to this encryption movement to be destroyed Storage device identification inquires this enciphered mobile storage apparatus to be destroyed and identifies this enciphered mobile storage apparatus to be destroyed corresponding, its In this enciphered mobile storage apparatus to be destroyed mark can be combined with any one or more of numeral, letter or Chinese character.Than As, this enciphered mobile storage apparatus to be destroyed mark can " enciphered mobile storage apparatus 1 " as shown in Fig. 1 (a), " encryption moves Dynamic storage device identification 2 " or " enciphered mobile storage apparatus 3 " etc..
Wherein, movable storage device can include u disk, portable hard drive, safe digital card (secure digital Memory card/sd card, sd card), micro sd card (English: micro sd card) etc..The mobile storage of this encryption Equipment can be the movable storage device being encrypted by recognition of face certification and is encrypted by fingerprint recognition certification Movable storage device etc..Wherein can refer to enter using face characteristic information by the enciphered mobile storage apparatus of recognition of face certification Row encryption, when user is when using this recognition of face authenticated encryption movable storage device, can be by this recognition of face authenticated encryption Movable storage device is inserted in bat by interface such as USB (universal serial bus, usb) According on such as pc in the terminal of function, the facial feature information of user is shot come to this recognition of face certification by the photographic head of pc Enciphered mobile storage apparatus are decrypted, if the facial feature information of user shooting is deposited with the movement of this recognition of face authenticated encryption The information matches degree of the face characteristic information gathering during the encryption of storage equipment, then can be right within default matching degree threshold range This recognition of face authenticated encryption movable storage device successful decryption adds so that this recognition of face certification can be read on this pc The data of storage in close movable storage device, conversely, then cannot read in this recognition of face authenticated encryption movable storage device Data of storage etc..In addition, the operating process when reading data for the enciphered mobile storage apparatus of this fingerprint recognition certification is same should Recognition of face authenticated encryption movable storage device is similar to, and will not be described here.
S102, this device management server detect whether this enciphered mobile storage apparatus to be destroyed has been turned on;If detecting This enciphered mobile storage apparatus to be destroyed has been turned on, then execution step s103, on the contrary then process ends.
It should be noted that whether this enciphered mobile storage apparatus to be destroyed has been turned on referring to this encryption movement to be destroyed Whether storage device is activated so that the data of this enciphered mobile storage apparatus to be destroyed storage will be read, if this to be destroyed plus Close movable storage device is activated so that the data of this enciphered mobile storage apparatus storage to be destroyed will be read, then may indicate that This enciphered mobile storage apparatus to be destroyed has been turned on, otherwise then may indicate that this enciphered mobile storage apparatus to be destroyed is not actuated; Or, if this enciphered mobile storage apparatus to be destroyed carrys out data storage using zoning, data encryption area data can be divided into Open area, wherein this data encryption area are used for storing that user is not desired to external disclosure, belongs to individual subscriber privacy and needs are protected Close data, the open area of this data can store user and the public can be carried out with disclosure, shared data, then this encryption to be destroyed Whether movable storage device has been turned on referring to whether this enciphered mobile storage apparatus to be destroyed is activated so that this will be read The data of the data encryption area storage of enciphered mobile storage apparatus to be destroyed, if this enciphered mobile storage apparatus to be destroyed is activated So that the data of the data encryption area storage of this enciphered mobile storage apparatus to be destroyed will be read, then may indicate that this is to be destroyed Enciphered mobile storage apparatus have been turned on, otherwise then may indicate that this enciphered mobile storage apparatus to be destroyed is not actuated etc..
In this enciphered mobile storage apparatus to be destroyed in the number that will read this enciphered mobile storage apparatus storage to be destroyed According to certain section of default program can be first carried out before, if this device management server detects this certain section default program and holds OK, then this device management server can detect that this enciphered mobile storage apparatus to be destroyed has been turned on;Or, this to be destroyed plus Close movable storage device can before the data of data encryption area storage in will reading this enciphered mobile storage apparatus to be destroyed To first carry out another section of default program, if this device management server detects this another section of default program and is carrying out, Then this device management server can detect that this enciphered mobile storage apparatus to be destroyed has been turned on.
In practice, such as u disk in the usb socket inserting computer but also can not read the number of this u disk memory storage on computers According to when can eject the dialog box installing * * application program, this * * program can refer to above-mentioned certain section of described default program or Another section of default program, computer can be by the content uploading of this dialog box to this device management server, thus this equipment control Server can detect that this u disk has been turned on.
This enciphered mobile storage apparatus to be destroyed of s103, this device management server send destroys data command to destroy this The data of storage in enciphered mobile storage apparatus to be destroyed.
It should be noted that this destruction data command can destroy whole numbers of storage in this enciphered mobile storage apparatus According to;Or only destroy this enciphered mobile storage apparatus data encryption area storage belong to the individual privacy of user and user is reluctant public affairs Data opened etc., the embodiment of the present invention is not construed as limiting.
Optionally, before this device management server receives and destroys request of data, this device management server is acceptable Receive personal online management Account Registration information, this personal online management Account Registration information includes login account name and registration account Family password;According to this login account name and this login account identification number register individual's online management account;And receive encryption movement Enciphered mobile storage apparatus are somebody's turn to do with registered by storage device bind request according to this enciphered mobile storage apparatus bind request Personal online management account is bound, and wherein this personal online management account is used for managing the binding of this people's online management account This enciphered mobile storage apparatus.
User can grasp in this personal online management as shown in the client such as pc or smart mobile phone shown in Fig. 1 (b) Make to insert individual's online management Account Registration information such as login account name and login account password on interface to be registered, this pc Or this personal online management Account Registration information that user inserts can be sent to this equipment control by the client such as smart mobile phone Server, this device management server receives this personal online management Account Registration information and is registered, after succeeding in registration, user Can pass through this login account name and this personal online management account operation interface of login account password login, and after login Select on this personal online management account operation interface to need this enciphered mobile storage apparatus of binding, and pass through this pc or intelligence Mobile phone sends enciphered mobile storage apparatus bind request to ask individual in this login in spool to this device management server Bind, under reason account, this enciphered mobile storage apparatus selecting to need binding;This device management server receives encryption movement and deposits Storage apparatus bound request, and select this to need this encryption of binding to move according to this enciphered mobile storage apparatus bind request Storage device is bound with this personal online management account registered.Finally, this device management server is online in this people Inquire about this in this enciphered mobile storage apparatus of account executive binding enciphered mobile storage apparatus to be destroyed mark is corresponding and treat pin Ruin enciphered mobile storage apparatus
For example, if the entitled abc of this login account, this login account password is 123, and user passes through this login account name After being the personal online management account successes of 123 registrations for abc with this login account password, it is entitled that user passes through this login account Abc and this login account password are 123 this personal online management account of login, and this personal online management account after login Select to need this enciphered mobile storage apparatus such as enciphered mobile storage apparatus 1 of binding and enciphered mobile storage apparatus 2 to carry out Binding etc..
Optionally, this device management server can be with the biological information of typing user, if this biological information Typing is passed through then to execute this reception individual's online management Account Registration information operation.
This device management server can by being connected with this device management server network, there is photographic head or fingerprint The biological information of the terminal typing user of identifier.Wherein, this biological information can be face characteristic information, fingerprint Characteristic information or pupil feature information etc..If than device management server typing be user face characteristic information, then examine Gauge head is sent out and whether is covered the hair of eyes or ear side and the checking information such as whether have been placed in after ear, if this is tested Card information is passed through then this biological information typing and is passed through, and in addition the biological information of this typing can also be real in the present invention Apply the enciphered mobile storage apparatus that example is related to be bound, as the Crypted password etc. of this enciphered mobile storage apparatus.
In method described by Fig. 1, device management server receives after destroying request of data, if detecting this to treat pin Ruin enciphered mobile storage apparatus to have been turned on, then send to this enciphered mobile storage apparatus to be destroyed and destroy data command to destroy this The data of storage in enciphered mobile storage apparatus to be destroyed.It can be seen that, the method implementing Fig. 1 description, work as enciphered mobile storage apparatus When being accidentally lost and being used, device management server can send to this enciphered mobile storage apparatus and destroy request of data with pin Ruin in this enciphered mobile storage apparatus the data of storage, thus lower that data storage in this enciphered mobile storage apparatus reveals is general Rate.
Refer to Fig. 2, Fig. 2 is a kind of structural representation of device management server disclosed in the embodiment of the present invention.Wherein, Device management server shown in Fig. 2 may include that
Receiving unit 201, destroys request of data for receiving, and wherein this destruction request of data includes encryption movement to be destroyed Storage device identification.
Equipment query unit 202, for inquiring about this enciphered mobile storage apparatus mark to be destroyed of this receiving unit 201 reception Know corresponding enciphered mobile storage apparatus to be destroyed.
Server can refer to, with higher computational power, storage capacity, can be supplied to multiple users by network and use Computer, wherein this device management server can refer to the server for managing this enciphered mobile storage apparatus.Specifically, One such as personal online management of platform managing this enciphered mobile storage apparatus can be arranged by this device management server Platform etc., such as shown in Fig. 1 (a), this personal online management platform can taken with this equipment control similar to an operation interface Client such as personal computer (personal computer, pc) client or smart mobile phone client that business device network is connected Shown on end etc.;One or more enciphered mobile storage apparatus can be bound under this personal online management platform, such as, Under personal online management platform shown in Fig. 1 (a), binding has enciphered mobile storage apparatus 1, enciphered mobile storage apparatus 2, adds Close movable storage device 3 and enciphered mobile storage apparatus 4, when some in the plurality of enciphered mobile storage apparatus or multiple plus When close movable storage device is lost, user can choose loss on this personal online management platform or user wants to destroy it This enciphered mobile storage apparatus of storage inside data simultaneously click on the enciphered mobile storage apparatus that this chooses destruction data below Button (as shown in Fig. 1 (a)) to send this destruction request of data to this device management server, then this device management server Receive this destruction request of data of this client transmission.Wherein this destruction request of data can be used to ask to destroy the encryption lost The data of storage in movable storage device.Wherein, the mobile storage of this encryption that should be selected on personal online management platform sets Standby can be used as this enciphered mobile storage apparatus to be destroyed.Such as, in bound enciphered mobile storage apparatus in Fig. 1 (a), Selected enciphered mobile storage apparatus are enciphered mobile storage apparatus 1, then this enciphered mobile storage apparatus 1 can be treated as this Destroy enciphered mobile storage apparatus.
It should be noted that this enciphered mobile storage apparatus to be destroyed can be one or more, the embodiment of the present invention is not It is construed as limiting.
In addition, this destruction request of data that this pc or smart mobile phone client pass through this personal online management platform transmission can To include this enciphered mobile storage apparatus mark to be destroyed, this device management server can be deposited according to this encryption movement to be destroyed Storage device identification inquires this enciphered mobile storage apparatus to be destroyed and identifies this enciphered mobile storage apparatus to be destroyed corresponding, its In this enciphered mobile storage apparatus to be destroyed mark can be combined with any one or more of numeral, letter or Chinese character.Than As, this enciphered mobile storage apparatus to be destroyed mark can " enciphered mobile storage apparatus 1 " as shown in Fig. 1 (a), " encryption moves Dynamic storage device identification 2 " or " enciphered mobile storage apparatus 3 " etc..
Equipment starts detector unit 203, for detecting this encryption movement to be destroyed that this equipment query unit 202 inquires Whether storage device has been turned on.
It should be noted that whether this enciphered mobile storage apparatus to be destroyed has been turned on referring to this encryption movement to be destroyed Whether storage device is activated so that the data of this enciphered mobile storage apparatus to be destroyed storage will be read, if this to be destroyed plus Close movable storage device is activated so that the data of this enciphered mobile storage apparatus storage to be destroyed will be read, then may indicate that This enciphered mobile storage apparatus to be destroyed has been turned on, otherwise then may indicate that this enciphered mobile storage apparatus to be destroyed is not actuated; Or, if this enciphered mobile storage apparatus to be destroyed carrys out data storage using zoning, data encryption area data can be divided into Open area, wherein this data encryption area are used for storing that user is not desired to external disclosure, belongs to individual subscriber privacy and needs are protected Close data, the open area of this data can store user and the public can be carried out with disclosure, shared data, then this encryption to be destroyed Whether movable storage device has been turned on referring to whether this enciphered mobile storage apparatus to be destroyed is activated so that this will be read The data of the data encryption area storage of enciphered mobile storage apparatus to be destroyed, if this enciphered mobile storage apparatus to be destroyed is activated So that the data of the data encryption area storage of this enciphered mobile storage apparatus to be destroyed will be read, then may indicate that this is to be destroyed Enciphered mobile storage apparatus have been turned on, otherwise then may indicate that this enciphered mobile storage apparatus to be destroyed is not actuated etc..
In this enciphered mobile storage apparatus to be destroyed in the number that will read this enciphered mobile storage apparatus storage to be destroyed According to certain section of default program can be first carried out before, if this device management server detects this certain section default program and holds OK, then this device management server can detect that this enciphered mobile storage apparatus to be destroyed has been turned on;Or, this to be destroyed plus Close movable storage device can before the data of data encryption area storage in will reading this enciphered mobile storage apparatus to be destroyed To first carry out another section of default program, if this device management server detects this another section of default program and is carrying out, Then this device management server can detect that this enciphered mobile storage apparatus to be destroyed has been turned on.
Destroy data command transmitting element 204, if starting detector unit 203 for this equipment this encryption to be destroyed is detected Movable storage device has been turned on, then send destruction data command to this enciphered mobile storage apparatus to be destroyed to be destroyed to destroy this The data of storage in enciphered mobile storage apparatus.
It should be noted that this destruction data command can destroy whole numbers of storage in this enciphered mobile storage apparatus According to;Or only destroy this enciphered mobile storage apparatus data encryption area storage belong to the individual privacy of user and user is reluctant public affairs Data opened etc., the embodiment of the present invention is not construed as limiting.
Optionally, in this enciphered mobile storage apparatus to be destroyed, the data of storage includes encryption data.This destruction data refers to Make transmitting element 204, treat pin specifically for sending destruction data command to this enciphered mobile storage apparatus to be destroyed to destroy this Ruin the encryption data of storage in enciphered mobile storage apparatus.
Optionally, this receiving unit 201, is additionally operable to, before receiving this destruction request of data, receive personal online management Account Registration information, this personal online management Account Registration information includes login account name and login account password.
This device management server, also includes:
Account Registration unit 205, this login account name and this login account for being received according to this receiving unit 201 are close The personal online management account of code registration.
This receiving unit 201, is additionally operable to receive enciphered mobile storage apparatus bind request.
Apparatus bound unit 206, for this enciphered mobile storage apparatus bind request being received according to this receiving unit 201 Enciphered mobile storage apparatus are bound with this personal online management account registered, wherein this personal online management account For managing this enciphered mobile storage apparatus of this people's online management account binding.
This equipment query unit 202, specifically for bind in this people's online management account in this apparatus bound unit 206 Inquire about this enciphered mobile storage apparatus to be destroyed in this enciphered mobile storage apparatus and identify the mobile storage of corresponding encryption to be destroyed Equipment.
User can grasp in this personal online management as shown in the client such as pc or smart mobile phone shown in Fig. 1 (b) Make to insert individual's online management Account Registration information such as login account name and login account password on interface to be registered, this pc Or this personal online management Account Registration information that user inserts can be sent to this equipment control by the client such as smart mobile phone Server, this device management server receives this personal online management Account Registration information and is registered, after succeeding in registration, user Can pass through this login account name and this personal online management account operation interface of login account password login, and after login Select on this personal online management account operation interface to need this enciphered mobile storage apparatus of binding, and pass through this pc or intelligence Mobile phone sends enciphered mobile storage apparatus bind request to ask individual in this login in spool to this device management server Bind, under reason account, this enciphered mobile storage apparatus selecting to need binding;This device management server receives encryption movement and deposits Storage apparatus bound request, and select this to need this encryption of binding to move according to this enciphered mobile storage apparatus bind request Storage device is bound with this personal online management account registered.Finally, this device management server is online in this people Inquire about this in this enciphered mobile storage apparatus of account executive binding enciphered mobile storage apparatus to be destroyed mark is corresponding and treat pin Ruin enciphered mobile storage apparatus
Optionally, this receiving unit 201, is additionally operable to receive the biological information of the user of typing, if this biological characteristic Data Enter passes through then to execute this reception individual's online management Account Registration information operation.
This device management server can by being connected with this device management server network, there is photographic head or fingerprint The biological information of the terminal typing user of identifier.Wherein, this biological information can be face characteristic information, fingerprint Characteristic information or pupil feature information etc..If than device management server typing be user face characteristic information, then examine Gauge head is sent out and whether is covered the hair of eyes or ear side and the checking information such as whether have been placed in after ear, if this is tested Card information is passed through then this biological information typing and is passed through, and in addition the biological information of this typing can also be real in the present invention Apply the enciphered mobile storage apparatus that example is related to be bound, as the Crypted password etc. of this enciphered mobile storage apparatus.
Optionally, described enciphered mobile storage apparatus include recognition of face authenticated encryption movable storage device and fingerprint recognition Authenticated encryption movable storage device.
It can be seen that, implement the device management server of Fig. 2 description, when enciphered mobile storage apparatus are accidentally lost and are used When, device management server can send to this enciphered mobile storage apparatus destroys request of data to destroy the mobile storage of this encryption The data of storage in equipment, thus reduce the probability that in this enciphered mobile storage apparatus, data storage is revealed.
Fig. 3 illustrates a kind of computer system 3 based on von Neumann system running above-mentioned application interface changing method. This computer system 3 can be smart mobile phone, panel computer, palm PC, the user terminal such as notebook computer or PC Equipment.Specifically, it may include the outer input interface 1001 that connected by system bus, processor 1002, memorizer 1003 and Output interface 1004.Wherein, outer input interface 1001 may include touch screen 10016, optionally can also include network interface 10018.Memorizer 1003 may include external memory 10032 (such as hard disk, CD or floppy disk etc.) and built-in storage 10034.Defeated Outgoing interface 1004 may include the equipment such as display screen 10042 and sound equipment/loudspeaker 10044.
In the present embodiment, the operation of this method is based on computer program, and the program file of this computer program is stored in In the aforementioned external memory 10032 based on the computer system 10 of von Neumann system, operationally it is loaded into built-in storage In 10034, after being then compiled as machine code, it is transferred to execution in processor 1002, so that being based on von Neumann system Computer system 10 in formed operation in logic monitor module 310, finger print detecting module 320, changing interface module 330, Pressure value judge module 340, the first step-length determining module 350 and the second step-length determining module 360, and cut in above-mentioned application interface Change in method implementation procedure, the parameter of input is all received by outer input interface 1001, and be transferred in memorizer 1003 slow Deposit, be then input to be processed in processor 1002, the result data of process or be cached in memorizer 1003 carries out follow-up Ground is processed, or is passed to output interface 1004 and is exported.
Step in present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device management server can merge according to actual needs, divides and delete Subtract.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Any modification, equivalent and improvement made within god and principle etc., should be included within the scope of the present invention.

Claims (10)

1. in a kind of enciphered mobile storage apparatus data destruction method it is characterised in that methods described includes:
Receive and destroy request of data, wherein said destruction request of data includes enciphered mobile storage apparatus mark to be destroyed, and Inquire about described enciphered mobile storage apparatus to be destroyed and identify corresponding enciphered mobile storage apparatus to be destroyed;
Detect whether described enciphered mobile storage apparatus to be destroyed have been turned on;
If described enciphered mobile storage apparatus to be destroyed is detected to have been turned on, send out to described enciphered mobile storage apparatus to be destroyed Send and destroy data command to destroy the data of storage in described enciphered mobile storage apparatus to be destroyed.
2. method according to claim 1 it is characterised in that in described enciphered mobile storage apparatus to be destroyed storage number According to inclusion encryption data;
Described transmission to described enciphered mobile storage apparatus to be destroyed destroys data command to destroy described encryption movement to be destroyed The data of storage in storage device, comprising:
Send to described enciphered mobile storage apparatus to be destroyed and destroy data command to destroy the mobile storage of described encryption to be destroyed The encryption data of storage in equipment.
3. method according to claim 1 is it is characterised in that before described reception destruction request of data, methods described is also Including:
Receive personal online management Account Registration information, described individual's online management Account Registration information include login account name and Login account password;
According to described login account name and described login account identification number register individual's online management account;And receive encryption movement Storage device bind request, according to described enciphered mobile storage apparatus bind request by enciphered mobile storage apparatus with registered Described individual's online management account is bound;
The described enciphered mobile storage apparatus to be destroyed of described inquiry identify corresponding enciphered mobile storage apparatus to be destroyed, comprising:
Inquire about described encryption movement to be destroyed to deposit in the described enciphered mobile storage apparatus of described people's online management account binding The storage corresponding enciphered mobile storage apparatus to be destroyed of device identification.
4. method according to claim 3 it is characterised in that described reception individual online management Account Registration information it Before, methods described also includes:
The biological information of typing user, if described biological information typing is passed through, executes described reception individual in spool Reason Account Registration information operation.
5. the method according to claim 3 or 4 is it is characterised in that described enciphered mobile storage apparatus include recognition of face Authenticated encryption movable storage device and fingerprint recognition authenticated encryption movable storage device.
6. a kind of device management server is it is characterised in that described device management server includes:
Receiving unit, destroys request of data for receiving, and wherein said destruction request of data includes the mobile storage of encryption to be destroyed Device identification;
Equipment query unit, corresponds to for inquiring about the enciphered mobile storage apparatus mark described to be destroyed that described receiving unit receives Enciphered mobile storage apparatus to be destroyed;
Equipment starts detector unit, sets for detecting that storage is moved in the encryption described to be destroyed that described equipment query unit inquires Standby whether have been turned on;
Destroy data command transmitting element, deposit if starting detector unit for described equipment and described encryption movement to be destroyed is detected Storage equipment has been turned on, then send to described enciphered mobile storage apparatus to be destroyed destroy data command with destroy described to be destroyed plus The data of storage in close movable storage device.
7. device management server according to claim 6 is it is characterised in that described enciphered mobile storage apparatus to be destroyed The data of middle storage includes encryption data;
Described destruction data command transmitting element, destroys data specifically for sending to described enciphered mobile storage apparatus to be destroyed Instruction is to destroy the encryption data of storage in described enciphered mobile storage apparatus to be destroyed.
8. device management server according to claim 6, it is characterised in that described receiving unit, is additionally operable to receiving Before described destruction request of data, receive personal online management Account Registration information, described individual's online management Account Registration letter Breath includes login account name and login account password;
Described device management server, also includes:
Account Registration unit, described login account name and described login account password for being received according to described receiving unit are noted The personal online management account of volume;
Described receiving unit, is additionally operable to receive enciphered mobile storage apparatus bind request;
Apparatus bound unit, the described enciphered mobile storage apparatus bind request for being received according to described receiving unit will be encrypted Movable storage device is bound with registered described individual's online management account;
Described equipment query unit, described in binding in described people's online management account in described apparatus bound unit Inquire about the corresponding encryption to be destroyed of described enciphered mobile storage apparatus mark to be destroyed in enciphered mobile storage apparatus and move storage Equipment.
9. device management server according to claim 8, it is characterised in that described receiving unit, is additionally operable to receive record The biological information of the user entering, if described biological information typing is passed through, executes the personal online management account of described reception Family log-on message operation.
10. device management server according to claim 8 or claim 9 is it is characterised in that described enciphered mobile storage apparatus bag Include recognition of face authenticated encryption movable storage device and fingerprint recognition authenticated encryption movable storage device.
CN201610762135.0A 2016-08-30 2016-08-30 Method of destructing data in encrypted mobile storage device and server Pending CN106355112A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610762135.0A CN106355112A (en) 2016-08-30 2016-08-30 Method of destructing data in encrypted mobile storage device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610762135.0A CN106355112A (en) 2016-08-30 2016-08-30 Method of destructing data in encrypted mobile storage device and server

Publications (1)

Publication Number Publication Date
CN106355112A true CN106355112A (en) 2017-01-25

Family

ID=57857615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610762135.0A Pending CN106355112A (en) 2016-08-30 2016-08-30 Method of destructing data in encrypted mobile storage device and server

Country Status (1)

Country Link
CN (1) CN106355112A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108376224A (en) * 2018-02-24 2018-08-07 深圳市大迈科技有限公司 A kind of movable storage device and its encryption method and device
CN108875424A (en) * 2017-05-10 2018-11-23 置富科技(深圳)股份有限公司 It stores terminal and its destroys data processing method and device
CN109831300A (en) * 2017-11-23 2019-05-31 航天信息股份有限公司 A kind of cipher key destruction method and device
CN113568846A (en) * 2021-07-29 2021-10-29 联想长风科技(北京)有限公司 Method and device for destroying encrypted hard disk

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588371A (en) * 2009-06-11 2009-11-25 王德高 Method based on internet for protecting memory device
CN101661441A (en) * 2009-09-08 2010-03-03 王德高 Protecting method for USB movable storage device based on internet
CN101782951A (en) * 2009-11-10 2010-07-21 徐欣 Hard disc remote destroying antitheft system and method
CN101882194A (en) * 2009-05-04 2010-11-10 同方股份有限公司 Mobile storage device with remote self-destruction function
CN102568555A (en) * 2012-01-31 2012-07-11 郑州信大捷安信息技术股份有限公司 USB (Universal Serial Bus) memory disc based on mobile module and remote management method thereof
CN102932762A (en) * 2012-09-20 2013-02-13 无锡华御信息技术有限公司 Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM)
CN104796532A (en) * 2015-03-13 2015-07-22 广东欧珀移动通信有限公司 Method and device for destroying mobile terminal
CN105592168A (en) * 2009-05-01 2016-05-18 苹果公司 Remotely locating and commanding a mobile device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592168A (en) * 2009-05-01 2016-05-18 苹果公司 Remotely locating and commanding a mobile device
CN101882194A (en) * 2009-05-04 2010-11-10 同方股份有限公司 Mobile storage device with remote self-destruction function
CN101588371A (en) * 2009-06-11 2009-11-25 王德高 Method based on internet for protecting memory device
CN101661441A (en) * 2009-09-08 2010-03-03 王德高 Protecting method for USB movable storage device based on internet
CN101782951A (en) * 2009-11-10 2010-07-21 徐欣 Hard disc remote destroying antitheft system and method
CN102568555A (en) * 2012-01-31 2012-07-11 郑州信大捷安信息技术股份有限公司 USB (Universal Serial Bus) memory disc based on mobile module and remote management method thereof
CN102932762A (en) * 2012-09-20 2013-02-13 无锡华御信息技术有限公司 Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM)
CN104796532A (en) * 2015-03-13 2015-07-22 广东欧珀移动通信有限公司 Method and device for destroying mobile terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875424A (en) * 2017-05-10 2018-11-23 置富科技(深圳)股份有限公司 It stores terminal and its destroys data processing method and device
CN109831300A (en) * 2017-11-23 2019-05-31 航天信息股份有限公司 A kind of cipher key destruction method and device
CN108376224A (en) * 2018-02-24 2018-08-07 深圳市大迈科技有限公司 A kind of movable storage device and its encryption method and device
CN113568846A (en) * 2021-07-29 2021-10-29 联想长风科技(北京)有限公司 Method and device for destroying encrypted hard disk

Similar Documents

Publication Publication Date Title
US11706033B2 (en) Secure distributed information system
CN105279449B (en) Data access control method, system and mobile equipment based on context
US7797549B2 (en) Secure method and system for biometric verification
CN105493054A (en) Fast data protection using dual file systems
CN104657674A (en) Isolation protection system and isolation protection method of private data in mobile phone
KR20080095866A (en) Computer session management device and system
CN103366107A (en) A method, device and mobile phone for protecting application program access rights
WO2007112023A2 (en) Secure biometric processing system and method of use
WO2016192165A1 (en) Data encryption method and apparatus
CN114730337A (en) Cryptographic key management
CN112636914B (en) Identity verification method, identity verification device and smart card
JP2008047085A (en) Data security system, apparatus and method using usb device
CN104951704B (en) A kind of image information collecting device and its encryption method
CN101140605A (en) Data safe reading method and safe storage device thereof
CN106355112A (en) Method of destructing data in encrypted mobile storage device and server
CN108322310A (en) It is a kind of to utilize safety equipment Card Reader login method and Security Login System
CN111027077B (en) Encryption method and device for storage equipment and storage medium
JP7105495B2 (en) Segmented key authenticator
CN105208045B (en) A kind of auth method, equipment and system
CN106650372A (en) open method and device of administrator authority
CN110321731A (en) A kind of information protecting method and mobile terminal
KR101221728B1 (en) The certification process server and the method for graphic OTP certification
CN107743179A (en) Information processing method, mobile terminal and operating system
CN111291429B (en) Data protection method and system
CN103824029B (en) Intelligent card data treating method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170125